Hello ACE-OAuth authors, authors of revoked-token-notifcation, and ACE
group in general,
while trying to understand the necessity for revoked-token-notification,
I was looking into the introspection parts of ACE
(draft-ietf-ace-oauth-authz-35 Section 5.7.1) and was confused at the
method used ther
Hi Christian,
The short answer is:
We aligned as close as possible with OAuth 2.0, and there Introspection uses
POST.
/Ludwig
> -Original Message-
> From: Christian Amsüss
> Sent: den 16 november 2020 08:59
> To: draft-ietf-ace-oauth-au...@ietf.org; draft-tiloca-ace-revoked-token-
> n
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Authentication and Authorization for
Constrained Environments WG of the IETF.
Title : Authentication and Authorization for Constrained
Environments (ACE) using the
Hello ACE,
In order to move the discussion forward I decided to implement the changes
suggested by Steffi to address the comments raised by John. Thank you for this
contribution Steffi. This update also fixes two minor issues found by Francesca
(mismatches in datatypes between text and figures,